Security Operations Center Analyst

Tokyo

Woven by Toyota

Woven by Toyota will help Toyota to develop next-generation cars and to realize a mobility society in which everyone can move freely, happily and safely.

View all jobs at Woven by Toyota

Apply now Apply later

About Woven by ToyotaWoven by Toyota, a part of the Toyota Group, is challenging the current state of mobility through human-centric innovation and empowering mobility transformation. Through our AD/ADAS technology, our automotive software development platform Arene OS, our mobility test course Toyota Woven City, and Toyota’s growth fund, Woven Capital, we are pioneering the movement of people, goods, information, and energy, weaving a future of enhanced safety, connectivity and well-being for all.
=========================================================================
TEAMThe Security team at Woven by Toyota is on the cutting edge of many challenging security problems. We identify emerging security threats in autonomous vehicles and help design more secure systems. We work closely with internal platform teams to provide a secure development environment through tooling and automation, allowing developers to innovate quickly without compromising security.
Woven by Toyota is pioneering the development of Woven City, a ground-breaking smart city project that serves as a living laboratory for future technologies. Our Security Operations Center (SOC) team plays a crucial role in protecting this innovative ecosystem.
WHO ARE WE LOOKING FOR?We are looking for an experienced Security Operations Center Analyst who has primary skills in log analysis and threat hunting. You will have an affinity for problem-solving; root-cause analysis; and, detection engineering.
In a rotating primary on-call schedule, you will take ownership of alert handling from intake through incident response and will engage appropriate partners across the business for rapid response and remediation. Between alerts, you will improve the signal-to-noise of our analytics through tuning existing rules, developing high-fidelity detections; and, identifying and closing visibility gaps in our log ingestion and processing, conducting threat hunts, and improving documentation.

RESPONSIBILITIES

  • Assess inbound alerts and handle through close or escalation
  • Take ownership of escalated alerts to ensure appropriate response and remediation is achieved
  • Refine and tune existing SIEM and EDR detections
  • Develop new high-fidelity detections for multiple platforms based on industry research and threat intelligence
  • Contribute to purple-teaming exercises to improve the overall practice of the global team
  • Design, plan, and implement new tooling and infrastructure to improve SOC detection and response capabilities
  • 3 days per week in-office
  • Rotating primary on-call coverage during local business hours
  • Rotating weekend on-call coverage (once a quarter)

MINIMUM QUALIFICATIONS

  • 4+ years experience in Security Operations or Security Engineering
  • Proven experience tracking down root-cause to complex problems and identifying technical solutions
  • Knowledge of endpoint, network, and cloud infrastructure security
  • Effective time management and prioritization
  • Professional and with excellent written and verbal communication skills
  • Strong collaboration and continuous-improvement mindset

NICE TO HAVES

  • Experience in Python, Powershell, bash
  • Experience with an Infrastructure as a Code tool like Terraform
  • Familiarity with cloud platforms like AWS
  • Broad experience using and/or securing multiple OSes (Windows, Mac & Linux)
=========================================================================Important Points・All interviews will be arranged via Google Meet, unless otherwise stated.・The same job descriptions are available in both English and Japanese; therefore, we kindly ask that you apply to only one version.・We kindly request that you submit your resume in English, if possible. However, Japanese resumes are also acceptable. Please note that, depending on the English proficiency requirements of the role, we may request an English version of your resume later in the process.
WHAT WE OFFER・Competitive Salary - Based on experience・Work Hours - Flexible working time・Paid Holiday - 20 days per year (prorated)・Sick Leave - 6 days per year (prorated)・Holiday - Sat & Sun, Japanese National Holidays, and other days defined by our company・Japanese Social Insurance - Health Insurance, Pension, Workers’ Comp, and Unemployment Insurance, Long-term care insurance・Housing Allowance・Retirement Benefits・Rental Cars Support・In-house Training Program (software study/language study)
Our Commitment・We are an equal opportunity employer and value diversity.・Any information we receive from you will be used only in the hiring and onboarding process. Please see our privacy notice for more details.
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  1  0

Tags: Analytics Automation AWS Bash Cloud EDR Incident response Linux Log analysis PowerShell Privacy Python SIEM SOC Terraform Threat intelligence Windows

Perks/benefits: Competitive pay Flex hours Health care Startup environment

Region: Asia/Pacific
Country: Japan

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.